LEADER 05342nam 22008535 450 001 9910484333203321 005 20200701044600.0 010 $a3-319-21476-4 024 7 $a10.1007/978-3-319-21476-4 035 $a(CKB)3710000000454195 035 $a(SSID)ssj0001558472 035 $a(PQKBManifestationID)16182960 035 $a(PQKBTitleCode)TC0001558472 035 $a(PQKBWorkID)14819116 035 $a(PQKB)11553223 035 $a(DE-He213)978-3-319-21476-4 035 $a(MiAaPQ)EBC6285478 035 $a(MiAaPQ)EBC5595022 035 $a(Au-PeEL)EBL5595022 035 $a(OCoLC)914300352 035 $a(PPN)187688788 035 $a(EXLCZ)993710000000454195 100 $a20150716d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aConstructive Side-Channel Analysis and Secure Design $e6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers /$fedited by Stefan Mangard, Axel Y. Poschmann 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (X, 271 p. 87 illus.) 225 1 $aSecurity and Cryptology ;$v9064 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-21475-6 327 $aSide-Channel Attacks -- Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements -- Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis) -- Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits -- Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks -- Two Operands of Multipliers in Side-Channel Attack -- FPGA Countermeasures -- Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs -- Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware -- Timing Attacks and Countermeasures -- A Faster and More Realistic Flush+Reload Attack on AES -- Faster software for fast endomorphisms -- Toward Secure Implementation of McEliece Decryption -- Fault Attacks -- Fault Injection with a new favor: Memetic Algorithms make a difference -- Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers -- A Biased Fault Attack on the Time Redundancy Countermeasure for AES -- Countermeasures -- Faster Mask Conversion with Lookup Tables -- Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC -- Hands-on Side-Channel Analysis Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs -- Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop, COSADE 2015, held in Berlin, Germany, in April 2015. The 17 revised full papers presented were carefully selected from 48 submissions. the focus of this workshop was on following topics: side-channel attacks, FPGA countermeasures, timing attacks and countermeasures, fault attacks, countermeasures, and Hands-on Side-channel analysis. 410 0$aSecurity and Cryptology ;$v9064 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8 702 $aMangard$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPoschmann$b Axel Y$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484333203321 996 $aConstructive Side-Channel Analysis and Secure Design$93084064 997 $aUNINA